Professionalism in Practice: Malware, Malevolent Online Practices, & Threat Modeling

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

Flashcards covering malware, malevolent online practices, and threat modeling concepts discussed in the Week 14 lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

What principle states that people are often the weakest link in the security chain?

The Weakest Link Principle

2
New cards

What factors are often targeted by exploiting software and information systems?

Human factors like social engineering and unintentional errors, and technology vulnerabilities like outdated apps or OS defects.

3
New cards

What predictable sequence of letters sent out by one particular German operator help crack the Enigma code?

CILLY

4
New cards

What is malware?

Any software designed to cause harm to computer systems, networks, or users.

5
New cards

Name 6 Types of Malware

Virus, Worms, Trojans, Ransomware, Zombie, Botnets

6
New cards

How does Virus spread?

Spreads through infected files

7
New cards

How do Worms spread?

Exploits security flaws to propagate over networks

8
New cards

How do Trojans spread?

Delivered through phishing or malicious downloads

9
New cards

How does Ransomware spread?

Typically, via phishing emails or infected websites

10
New cards

How does Zombie malware spread?

Zombies can be created by any malware, i.e., Trojans or worms

11
New cards

How do Botnets spread?

Malware infiltrates devices, turning them into bots that can be used for malicious purposes

12
New cards

What is a DDoS attack?

A distributed denial of service attack; when a hacker makes a website or other service inaccessible by flooding it with requests from many different devices

13
New cards

Describe 5 ways Malware Gains Access

Phishing Emails, Exploiting Vulnerabilities, Social Engineering, Malicious Websites/Ads, Infected Software/Downloads

14
New cards

Who are the Malware Practitioners?

Cybercriminals, Hacktivists, State-Sponsored Actors, Script Kiddies, Cybersecurity Researchers

15
New cards

What is Phishing?

Spam emails containing a convincing hyperlink that looks like it’s from a trusted source used to trick victims into entering personal info

16
New cards

What is Spear-Phishing?

A more targeted and personalized form of phishing where attackers tailor their fraudulent messages to a specific individual or organization

17
New cards

What is Social Engineering?

"Hacking without code" but relying on the principle of trust to convince the victim to trust them, ask for money/details

18
New cards

What is Grooming?

Gaining trust of a victim by being nice over time and then getting the victim to reveal information about themselves or involve them in a crime unknowingly

19
New cards

What is Online Stalking?

Obsessively following or watching a person without their knowledge

20
New cards

What is Doxing?

Publishing private data (addresses, phone numbers) with malicious intent

21
New cards

What are Deepfakes

AI‐generated images, videos, or audio that appear real used for impersonation, creating fake evidence, or spreading misinformation

22
New cards

Define Misinformation

Sharing false or misleading information unintentionally

23
New cards

Define Disinformation

Deliberate spread of false information to manipulate or deceive

24
New cards

What is threat modelling?

A technique within the security lifecycle to analyze a system’s security & privacy concerns

25
New cards

Name the 5 Key phases of Threat Modelling

Asset Identification, Threat Analysis, Vulnerability Analysis, Risk Assessment, Risk Communication

26
New cards

What is a Threat Agent?

Someone or something that can cause harm; can be classified as natural, accidental or malicious.

27
New cards

Name the two Threat Modeling Frameworks cited in the lecture.

STRIDE and DREAD

28
New cards

What does STRIDE stand for?

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege

29
New cards

What does DREAD stand for?

Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability